About accounts, privilege sets, and extended privileges
You use accounts, privilege sets and extended privileges to protect FileMaker Pro database files.
Accounts
Accounts authenticate users who are attempting to open a protected file. Each account specifies an account name and (usually) a password. Any user that cannot specify valid account information won’t be able to open a protected file.
Each file initially contains two accounts: Admin and Guest. For more information, see About the Admin and Guest accounts.
You may want to create an account for every individual who accesses a file, or you may want to create a small number of accounts that are shared among many individuals, such as a “Marketing” account and a “Sales” account:
  •
  •
Create shared accounts when you want fewer accounts to maintain and you are less concerned about managing individual access to the database file.
If you host files on FileMaker Server, you can create External Server accounts that obtain authentication information from an authentication server such as an Apple OpenDirectory or Windows Domain. This allows you to use a centrally-managed user directory that may already be in use to manage access to other network resources such as file servers. For more information, see Creating accounts that authenticate via an external server.
For more details on accounts, see Creating and managing accounts.
Privilege sets
A privilege set specifies a level of access to a database file. When you create a privilege set, there are many options available that you can use to limit database access, such as which layouts are viewable, which menus are available, and whether printing is permitted. Privilege sets can also restrict access to particular tables, records, or fields within a file. Each account is assigned a privilege set, which determines the level of access when someone opens a file using that account.
You can create as many privilege sets as you need to define the types of access you want to permit to a file. Each database file contains three pre-defined privilege sets for common types of access levels.
For more information about privilege sets, see Using the pre-defined privilege sets and Creating and managing privilege sets.
Extended privileges
Extended privileges determine the data sharing options that are permitted by a privilege set, such as whether a privilege set permits users to open a shared file or view a database in a web browser.
The following table lists the default extended privileges that are available. (FileMaker as well as third-party developers may define additional extended privileges to manage access to other software products designed to work with FileMaker Pro or FileMaker Server.)
 
Opening a shared file (either a file shared by FileMaker Pro or hosted and shared by FileMaker Server).
Accessing a database file from a web browser or other application via XML web publishing - FileMaker Server only.
Accessing a database file from a web browser or other application via XSLT web publishing - FileMaker Server only.
Accessing a database file from a web browser or other application via PHP web publishing - FileMaker Server only.
When a user attempts to open or access a protected file using one of the above methods, the user will be prompted to provide account information. If the privilege set for the account does not permit the type of extended privilege access the user is requesting, the user will get an error indicating that they cannot access the file in that way.
All extended privileges for a file are disabled by default, even in the Full Access privilege set.
Enabling extended privileges only makes it allowable for certain privilege sets to access shared data. To actually access the shared data, you must also set up sharing for the type of access that you want. For more information, see Sharing databases on a network, Using ODBC and JDBC with FileMaker Pro, or Publishing databases on the web.
For more information on extended privileges, see Managing extended privileges.
Note  Shared accounts are a security risk. For better security, use individual accounts instead of shared accounts. If you intend to use shared accounts anyway, make sure you limit the access capabilities of the privilege sets that shared accounts use. Change the password occasionally, particularly when certain users no longer require access.